ISC2 Certified In Cybersecurity (CC)
Practice Exam Questions with correct
Answers (A+ GRADED 100%
VERIFIED)
______ is used to ensure that configuration management activities are effective and
enforced.
A. Inventory
B. Baseline
C. Identification
D. Verification and audit - ANSWER: D. Verification and audit
"Wiring _____" is a common term meaning "a place where wires/conduits are often
run, and equipment can be placed, in order to facilitate the use of local networks."
A. Shelf
B. Closet
C. Bracket
D. House - ANSWER: B. Closet
(ISC)² publishes a Common Body of Knowledge (CBK) that IT security practitioners
should be familiar with; this is recognized throughout the industry as a set of material
that is useful for practitioners to refer to. Certifications can be issued for
demonstrating expertise in this Common Body of Knowledge. What kind of document
is the Common Body of Knowledge?
A. Policy
B. Procedure
C. Standard
D. Law - ANSWER: C. Standard
A _____ is a record of something that has occurred.
A. Biometric
B. Law
C. Log
D. Firewall - ANSWER: C. Log
A bollard is a post set securely in the ground in order to prevent a vehicle from
entering an area or driving past a certain point. Bollards are an example of ______
controls.
A. Physical
,B. Administrative
C. Drastic
D. Technical - ANSWER: A. Physical
A device that filters network traffic in order to enhance overall security/performance.
A. Endpoint
B. Laptop
C. MAC (media access control)
D. Firewall - ANSWER: D. Firewall
A device that is commonly useful to have on the perimeter between two networks.
A. User laptop
B. IoT
C. Camera
D. Firewall - ANSWER: D. Firewall
A device typically accessed by multiple users, often intended for a single purpose,
such as managing email or web pages.
A. Router
B. Switch
C. Server
D. Laptop - ANSWER: C. Server
A human guard monitoring a hidden camera could be considered a ______ control.
A. Detective
B. Preventive
C. Deterrent
D. Logical - ANSWER: A. Detective
A means to allow remote users to have secure access to the internal IT environment.
A. Internet
B. VLAN
C. MAC
D. VPN - ANSWER: D. VPN
A software firewall is an application that runs on a device and prevents specific types
of traffic from entering that device. This is a type of ________ control.
A. Physical
B. Administrative
C. Passive
D. Technical - ANSWER: D. Technical
A system that collects transactional information and stores it in a record in order to
show which users performed which actions is an example of providing ________.
, A. Non-repudiation
B. Multifactor authentication
C. Biometrics
D. Privacy - ANSWER: A. Non-repudiation
A tool that aggregates log data from multiple sources, and typically analyzes it and
reports potential threats.
A. HIDS
B. Anti-malware
C. Router
D. SIEM - ANSWER: D. SIEM
A tool that filters inbound traffic to reduce potential threats.
A. NIDS (network-based intrusions-detection systems)
B. Anti-malware
C. DLP (data loss prevention)
D. Firewall - ANSWER: D. Firewall
A tool that inspects outbound traffic to reduce potential threats.
A. NIDS (network-based intrusion-detection systems)
B. Anti-malware
C. DLP (data loss prevention)
D. Firewall - ANSWER: C. DLP (data loss provention)
A tool that monitors local devices to reduce potential threats from hostile software.
A. NIDS (network-based intrusion-detection systems
B. Anti-malware
C. DLP (data loss prevention)
D. Firewall - ANSWER: B. Anti-malware
A vendor sells a particular operating system (OS). In order to deploy the OS securely
on different platforms, the vendor publishes several sets of instructions on how to
install it, depending on which platform the customer is using. This is an example of
______.
A. Law
B. Procedure
C. Standard
D. Policy - ANSWER: B. Procedure
A VLAN is a _____ method of segmenting networks.
A. Secret
B. Physical
C. Regulated
D. Logical - ANSWER: D. Logical
Practice Exam Questions with correct
Answers (A+ GRADED 100%
VERIFIED)
______ is used to ensure that configuration management activities are effective and
enforced.
A. Inventory
B. Baseline
C. Identification
D. Verification and audit - ANSWER: D. Verification and audit
"Wiring _____" is a common term meaning "a place where wires/conduits are often
run, and equipment can be placed, in order to facilitate the use of local networks."
A. Shelf
B. Closet
C. Bracket
D. House - ANSWER: B. Closet
(ISC)² publishes a Common Body of Knowledge (CBK) that IT security practitioners
should be familiar with; this is recognized throughout the industry as a set of material
that is useful for practitioners to refer to. Certifications can be issued for
demonstrating expertise in this Common Body of Knowledge. What kind of document
is the Common Body of Knowledge?
A. Policy
B. Procedure
C. Standard
D. Law - ANSWER: C. Standard
A _____ is a record of something that has occurred.
A. Biometric
B. Law
C. Log
D. Firewall - ANSWER: C. Log
A bollard is a post set securely in the ground in order to prevent a vehicle from
entering an area or driving past a certain point. Bollards are an example of ______
controls.
A. Physical
,B. Administrative
C. Drastic
D. Technical - ANSWER: A. Physical
A device that filters network traffic in order to enhance overall security/performance.
A. Endpoint
B. Laptop
C. MAC (media access control)
D. Firewall - ANSWER: D. Firewall
A device that is commonly useful to have on the perimeter between two networks.
A. User laptop
B. IoT
C. Camera
D. Firewall - ANSWER: D. Firewall
A device typically accessed by multiple users, often intended for a single purpose,
such as managing email or web pages.
A. Router
B. Switch
C. Server
D. Laptop - ANSWER: C. Server
A human guard monitoring a hidden camera could be considered a ______ control.
A. Detective
B. Preventive
C. Deterrent
D. Logical - ANSWER: A. Detective
A means to allow remote users to have secure access to the internal IT environment.
A. Internet
B. VLAN
C. MAC
D. VPN - ANSWER: D. VPN
A software firewall is an application that runs on a device and prevents specific types
of traffic from entering that device. This is a type of ________ control.
A. Physical
B. Administrative
C. Passive
D. Technical - ANSWER: D. Technical
A system that collects transactional information and stores it in a record in order to
show which users performed which actions is an example of providing ________.
, A. Non-repudiation
B. Multifactor authentication
C. Biometrics
D. Privacy - ANSWER: A. Non-repudiation
A tool that aggregates log data from multiple sources, and typically analyzes it and
reports potential threats.
A. HIDS
B. Anti-malware
C. Router
D. SIEM - ANSWER: D. SIEM
A tool that filters inbound traffic to reduce potential threats.
A. NIDS (network-based intrusions-detection systems)
B. Anti-malware
C. DLP (data loss prevention)
D. Firewall - ANSWER: D. Firewall
A tool that inspects outbound traffic to reduce potential threats.
A. NIDS (network-based intrusion-detection systems)
B. Anti-malware
C. DLP (data loss prevention)
D. Firewall - ANSWER: C. DLP (data loss provention)
A tool that monitors local devices to reduce potential threats from hostile software.
A. NIDS (network-based intrusion-detection systems
B. Anti-malware
C. DLP (data loss prevention)
D. Firewall - ANSWER: B. Anti-malware
A vendor sells a particular operating system (OS). In order to deploy the OS securely
on different platforms, the vendor publishes several sets of instructions on how to
install it, depending on which platform the customer is using. This is an example of
______.
A. Law
B. Procedure
C. Standard
D. Policy - ANSWER: B. Procedure
A VLAN is a _____ method of segmenting networks.
A. Secret
B. Physical
C. Regulated
D. Logical - ANSWER: D. Logical